TelecomTV TelecomTV
  • News
  • Videos
  • Channels
  • Events
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • Digital Platforms and Services
  • Open RAN
  • Cloud Native Telco
  • Telcos and Public Cloud
  • The Green Network
  • Private Networks
  • Open Telco Infra
  • 5G Evolution
  • Access Evolution
  • Edgenomics
  • Network Automation
  • 6G Research and Innovation
  • Security
  • More Topics
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • |
  • About
  • Contact
  • |
  • Connect with us
  • Digital Platforms and Services
  • Open RAN
  • Cloud Native Telco
  • Telcos and Public Cloud
  • The Green Network
  • Private Networks
  • Open Telco Infra
  • 5G Evolution
  • Access Evolution
  • Edgenomics
  • Network Automation
  • 6G Research & Innovation
  • Security
  • Connect with TelecomTV
  • About
  • Privacy
  • Help
  • Contact
  • Sign In Register Subscribe
    • Subscribe
    • Sign In
    • Register
  • Search

News

News

Telco employees targetted by GCHQ via LinkedIn

Nov 11, 2013

According to German magazine, Der Spiegel, the UK's GCHQ security service/listening post has been playing fast and loose with fake LinkedIn pages to bug the PCs of telco employees of companies it wanted to spy on. The telcos include Mach and Belgacom.

GCHQ agents appear to have a developed a reliable little process - gathering names and IP addresses and then redirecting the targets to their own bogus LinkedIn or Slashdot pages (identical to the real ones) where malware could be attached to their computers which then went on to monitor everything they did online.Der Spiegel received the information from ex NSA contractor Edward Snowden via journalist Laura Poitras.Der Spiegel shows on its web site just how detailed the picture GCHQ was able to build - essentially a complex collection of data including Skype and Gmail details along with his social networking profile.

Another team picked up the process from here and used high-speed servers to reroute the subject's internet connections.

The objective was to use the telco targets to get access to encrypted links between clearinghouses and mobile network operators to gather sensitive information.

Internal documents from the security service seem to indicate that the technique was over 50 per cent sucessful.

Naturally LinkedIn is aghast, claiming to have had no knowledge of any of the clandestine activities.

Related Topics
  • Analysis & Opinion,
  • News

More Like This

Access Evolution

What’s up with… Gigaclear, Cisco, Tele2

Jun 8, 2023

Security

Orange cautions of unexpected cyberattack shifts

Jun 8, 2023

Digital Platforms and Services

Techco hopefuls face staffing challenges – poll result

Jun 8, 2023

Access Evolution

What’s up with… Vantage Towers, Vodafone & Three, fair share debate

Jun 7, 2023

Digital Platforms and Services

Proximus unveils NXT big step for enterprise growth

Jun 7, 2023

Email Newsletters

Sign up to receive TelecomTV's top news and videos, plus exclusive subscriber-only content direct to your inbox.

Subscribe

Top Picks

Highlights of our content from across TelecomTV today

1:17:33

From telco to techco: The impact of next-gen operations on skills, talent acquisition and retention

1:14:31

Achieving maximum operational efficiency: How service providers can best operate at speed and scale

1:14:20

Why data and APIs are key to implementing the vision of the digital services provider

TelecomTV
Company
  • About Us
  • Media Kit
  • Contact Us
Our Brands
  • DSP Leaders World Forum
  • Great Telco Debate
  • TelecomTV Events
Get In Touch
[email protected]
+44 (0) 207 448 1070
Connect With Us

  • Privacy
  • Cookies
  • Terms of Use
  • Legal Notices
  • Help

TelecomTV is produced by the team at Decisive Media.

© Decisive Media Limited 2023. All rights reserved. All brands and products are the trademarks of their respective holder(s).